General

  • Target

    2025-01-21_36ad0603776f34d90e13324ccdf9732b_mafia

  • Size

    13.7MB

  • Sample

    250121-1hsppssngl

  • MD5

    36ad0603776f34d90e13324ccdf9732b

  • SHA1

    d8248c185a92b9318d70a71804ebca51553f23ed

  • SHA256

    1f44bd12254ee5f6bb61ea433d76ab8e00a6f1d8c33e3a9e4abcaba508e1fefe

  • SHA512

    63679de0e5bafc340ba3d739622f80d4195e65c1631f2e525ea1696a8d6ae3e4f19365e6083ae4bd45cf36796416cce53c650aeaa35d9ff9f85c45f56b27194d

  • SSDEEP

    3072:wLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:NOMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-01-21_36ad0603776f34d90e13324ccdf9732b_mafia

    • Size

      13.7MB

    • MD5

      36ad0603776f34d90e13324ccdf9732b

    • SHA1

      d8248c185a92b9318d70a71804ebca51553f23ed

    • SHA256

      1f44bd12254ee5f6bb61ea433d76ab8e00a6f1d8c33e3a9e4abcaba508e1fefe

    • SHA512

      63679de0e5bafc340ba3d739622f80d4195e65c1631f2e525ea1696a8d6ae3e4f19365e6083ae4bd45cf36796416cce53c650aeaa35d9ff9f85c45f56b27194d

    • SSDEEP

      3072:wLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:NOMdRQr7OB0ypmMXnl8XEPM3noSWOC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks